Upload
vokhue
View
228
Download
1
Embed Size (px)
Citation preview
Gartner Security & Risk Management Summit 201514 – 15 September | London, UK | gartner.com/eu/security
Five Programs
• ChiefInformationSecurityOfficer(CISO)
• RiskManagementandCompliance
• SecurityManagerProgram:Technology,TrendsandOperations
• BusinessContinuityManagement
• InternetofThingsSecurity
TheWorld’sMostImportantGatheringforSecurityandRiskExecutives
EARLY-BIRD DIscount save €325 by 17 July
Visit gartner.com/eu/security for more information
Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency
GetthetoolsyouneedtodeliversecuredigitalbusinessenvironmentsandensureyourorganizationcanweatheranattackordisruptionandbouncebackquicklyatGartner Security & Risk Management Summit 2015, 14 – 15 September, London, UK.Thisyear’sconferencecoversthebreadthofprioritiesinITsecurity,riskmanagement,governance,compliance,BCM,theroleoftheCISO,thebusinessofsecurity,privacy,IAMandmore.
JoinusthisSeptembertofindouthowyoucanadvanceyoursecurityandriskgoalstosupportbusinessobjectivesandimproveresilienceacrosstheorganization.
Key benefits of attending
•Gaintoolsandstrategiestostayaheadofyournewresponsibilitiesandincreasingthreats
•Alignsecurityandriskstrategieswithyourenterpriseobjectivesanddigitaltransformation
•Assurecompliancewithnewregulatory,compliance,privacyande-discoveryrequirements
•Applythelatesttechniquestotacklerisksincloud,OTandIoT
•Buildaculturethatdrivessecurityperformancethroughemployeeengagement
Who will be there?
•ChiefInformationSecurityOfficers
•ChiefRiskOfficers
•ChiefInformationOfficers
•ITVicePresidents/Directors
•ITSecurityOfficers/Directors
•Risk,ComplianceandPrivacyManagers
•InformationSecurity/RiskManagers
•Network,Infrastructure,SolutionsandSecurityArchitects
Gartner Security & Risk Management Summit 2015#gartnersecurity
Reevaluate your security and risk strategies and investments for the digital age
DigitalbusinesstechnologiesandtheInternetofThingsarecreatingnewthreatsandrisksevenasregulatorycomplianceandlegalriskscontinuetoescalate,andsophisticatedcyberthreatschallengeeventhebestsecuritystrategies.Everybusinessisnowadigitalbusiness,andeverybusinessmustbecomeproficientatriskassessmentandmitigation,thefoundationofsuccessinthedigitalage.
Thisyear’ssummitdeliversthelatestresearchandrecommendationsacrosssecurityandriskmanagementpriorities,andprovidesyouwithsolutionstothelatesthottopics,including:
•Application,networkandinfrastructuresecurity
•Cloudsecurity
•Mobilesecurity
•Cybersecurity
•Digitalbusinesssecurityandriskmanagement
•Operationaltechnology(OT)securityandriskmanagement
•OrganizationalresiliencethroughBCM
•Riskmanagementandcompliance
•SecurityAwarenessandTraining
TheintersectionofIT,operationaltechnologyandtheInternetofThingsisspawninganewgenerationofthreats.Joinusforthelateststrategiestohelpyouanticipaterisk,mitigateitsimpactandenablesuccessfulbusinessoutcomes.
What’s new for 2015•Revampedagendafeaturingnewcontent,andcoveringkeychallengessuchasapplications,networkandmobilesecurity;securityforthecloud;digitalbusinesssecurity,riskmanagementandprivacyandEUregulations
•FirsteverpresentationofMagicQuadrantforoperationalriskmanagement
•Industry-orientatedcontent,especiallyaroundfinancialservices,bankingandinsurance
•Focusedsessionsoncrisisandincidentmanagement
•Contenttailoredforsmallandmediumbusinesses
•Expandedopportunitytonetworkwithyourpeerswithnetworkinglunchesanddrinksreceptionsavailable
Gartner Security & Risk Management Summit 2015
AgendaataGlance
#gartnersecurity
Mo
nday
14 S
ep
te
mb
er
201
5Tu
esd
ay15
Se
pt
em
be
r 2
015
07:30–20:00 RegistrationandInformation
08:00–08:45 Tutorial:TopTrendsandTakewaysforCybersecurity Earl Perkins Tutorial:BestPracticesinCrisisCommunications Roberta Witty
09:00–10:00 Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle
10:00–10:30 IndustryPanel
10:30–11:00 RefreshmentBreakintheSolutionShowcase 10:35 – 10:55 MagicQuadrantforSecurityInformationandEventManagement Oliver Rochford
11:00–12:00 Guest Keynote tobeconfirmedshortly
12:00–13:15 LunchintheSolutionShowcase 12:15 – 12:35 MagicQuadrantforOperationalRiskManagement John Wheeler
TRAcks A. chief Information security Officer (cIsO) Program
B. Risk Management and compliance Program
c. security Manager Program: Technology, Trends and Operations D. Business continuity Management Program and
E. Internet of Things security Program
Workshops and contract Negotiation clinics
Roundtables
13:15–14:00 TheNewCISO'sCrucialFirst100Days Tom scholtz
APublicCloudRiskModel:AcceptingCloudRiskisOK,IgnoringCloudRiskisTragic Paul Proctor
DefensiveStrategiesinanAgeofDigitalInsurgency Oliver Rochford
Gartner'sAdaptiveSecurityArchitecture:NewApproachesforAdvancedandInsiderThreatsNeil MacDonald
TheAvailabilityImplicationsforDigitalBusiness Roberta Witty
12:45 – 14:15 Workshop:GetIncident-Ready.TestYourPlanwithaScenario Rob McMillan
13:15 – 14:15 Roundtable:ReduceTheRisksandImplementDataAccessControlsNow!Brian Lowans
14:15–14:45 SolutionProviderSessions14:30 – 16:00 Workshop:GetSecurityRightinanSMBEnvironment Rob McMillan
14:45–15:15 RefreshmentBreakintheSolutionShowcase
15:15–16:00 BeAgileNotFragile:UseThreatIntelligenceServicestoDefendYourself Rob McMillan
ThePathtoHighImpactSecurityAwareness christian Byrnes
MobileSecurityThreatsandTrends2015 Dionisio Zumerle
SecuringSensitiveSaaSUsingCloudAccessSecurityBrokers Ramon krikken
CaseStudy 15:15 – 16:15 Roundtable:ChangingYourSecurityCulture:WhyChangeisHardandWhattoDoAboutIt Debra Logan
16:15–16:45 SolutionProviderSessions 16:15 – 17:45 Workshop:SecureSelf-AssessingandSelf-CleansingSystemswithDevOps?Joerg Fritsch
16:30 – 17:30 Roundtable:ManagingtheIdentityofThingsAnt Allan
17:00–17:30 ProtectingYourHouseonthePrairie:SecurityStrategyfortheSmallerEnterprise Tom scholtz
IncidentResponsePlatforms—ALongTimeComing Rob McMillan
YourCloudServiceAdoptionStrategyMustIncludeDataProtection Brian Lowans
TheDarkSideofPaymentCardSecurity Jonathan care
WhyCrisisManagementistheHeartofBCMSoftware Roberta Witty
17:30–20:00 NetworkingReceptionintheSolutionShowcase
07:45–17:15 RegistrationandInformation
08:00–08:45 People-CentricSecurity:ExperiencesandLessonsLearnt Tom scholtz
HowtoGetSingleSignOn Ant Allan DefendingEndpointsfromthePersistentAttack Peter Firstbrook
PrivacyandtheInternetofThings:HowtoAvoidCrossingtheCreepyLine carsten casper
08:00 – 09:30 ContractNegotiatingClinic:CloudContracts,DevelopYourOwnSecurityandRiskExhibits Gayla sullivan
08:00 – 09:00 Roundtable:DoyouMeasuretheImpactofYourAwarenessProgram? christian Byrnes
09:00–09:45 CaseStudy What'sNewandHotinGRC? John Wheeler FutureofEndpointManagement Rob smith DefendingAgainstSophisticatedMalware Mario de Boer
BalancingTrustandUserExperienceforUserAuthentication Ant Allan
09:45–10:15 RefreshmentBreakintheSolutionShowcase
10:15–10:45 SolutionProviderSessions
11:00–11:45 CaseStudy UseaVendorRiskManagementFrameworktoMitigateRegulatory,Compliance,SecurityandPerformanceIssues Gayla sullivan
Panel:MobileSecurityandManagement:ARealWorldDiscussion Rob smith et al.
DesigningtheModernApplicationSecurityPerimeter—WithMobileandCloudinMind Ramon krikken
CybersecurityPanel:ITSecurity,OTSecurity,IoTSecurity:ImpactsandRecommendations Earl Perkins et al.
10:45 – 12:15 Workshop:IntroductiontoMobileSecuritySelf-Assessments John Girard and Dionisio Zumerle
10:45 – 11:45 Roundtable:BuildingSuccessfulBusinessMetricsforTechnologyRiskPaul Proctor
11:45–13:00 LunchintheSolutionShowcase 12:30 – 12:50 MagicQuadrantforEnterpriseNetworkFirewalls Jeremy D’Hoinne
13:00–13:45 AvoidFiveSecurityStaffingDisasters Jeremy D’Hoinne
DigitalBusinessandYourNewRelationshipwithRisk Paul Proctor
WhatRoleWillVPNsPlayinYourBusinessFuture? John Girard
SecureUseofAWSandAzure:ComparisonandBestPractices Neil MacDonald
OperationalTechnologySecurityisNotJustforIndustriesAnymore Earl Perkins
13:00 – 14:30 Workshop:IdentityProofingRevisitedasDataPrivacyDies Jonathan care
13:00 – 14:00 Roundtable:WhySocialMediaRisksAreSkyrocketingandWhatYouCanDotoProtectYourCompany John Wheeler
14:00–14:30 ChiefDataOfficersandChiefInformationSecurityOfficers:FriendsorFoes? Debra Logan
WhatCanWeExpectfromtheUpcomingEUDataProtectionRegulation? carsten casper
LessonsLearnedonAdvancedThreatDefenseStrategiesandTools Jeremy D’Hoinne
ProtectingMobileAppsDionisio Zumerle
CaseStudy
14:30–15:00 RefreshmentBreakintheSolutionShowcase14:45 – 16:15 Workshop:ReportingRiskandSecuritytoyourBoardofDirectors Paul Proctor
15:00–15:30 CaseStudy HowToBuildAGloballyLegalandSuccessfulBYODProgram John Girard
FriendsattheGate?BestPracticesforEnablingRemotePrivilegedAccessFromVendorsandThirdParties Felix Gaehtgens
TheLegalityandEthicsofIoTandEmployeeMonitoring TBD
15:00 – 16:00 Roundtable:SecureUseofPublicCloudNeil MacDonald
15:45–16:15 OneSimpleWaytoGetYourCEOtoEmbraceRiskManagement John Wheeler
AssessingCloudServiceProviders:GettingBeyondtheChecklistsErik Heidt
WhatYourContainersdoNotContain!AbouttheSecurityPropertiesofContainersManagedbyDocker Joerg Fritsch
WomeninSecurityandRiskManagement:DoWomenApproachSecurityandRiskManagementDifferentlyThanMen? Roberta Witty
16:30–17:15 Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security Neil MacDonald
Visit gartner.com/eu/security for more information
Agenda as of 19 June 2015
During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information.
07:30–20:00 RegistrationandInformation
08:00–08:45 Tutorial:TopTrendsandTakewaysforCybersecurity Earl Perkins Tutorial:BestPracticesinCrisisCommunications Roberta Witty
09:00–10:00 Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle
10:00–10:30 IndustryPanel
10:30–11:00 RefreshmentBreakintheSolutionShowcase 10:35 – 10:55 MagicQuadrantforSecurityInformationandEventManagement Oliver Rochford
11:00–12:00 Guest Keynote tobeconfirmedshortly
12:00–13:15 LunchintheSolutionShowcase 12:15 – 12:35 MagicQuadrantforOperationalRiskManagement John Wheeler
TRAcks A. chief Information security Officer (cIsO) Program
B. Risk Management and compliance Program
c. security Manager Program: Technology, Trends and Operations D. Business continuity Management Program and
E. Internet of Things security Program
Workshops and contract Negotiation clinics
Roundtables
13:15–14:00 TheNewCISO'sCrucialFirst100Days Tom scholtz
APublicCloudRiskModel:AcceptingCloudRiskisOK,IgnoringCloudRiskisTragic Paul Proctor
DefensiveStrategiesinanAgeofDigitalInsurgency Oliver Rochford
Gartner'sAdaptiveSecurityArchitecture:NewApproachesforAdvancedandInsiderThreatsNeil MacDonald
TheAvailabilityImplicationsforDigitalBusiness Roberta Witty
12:45 – 14:15 Workshop:GetIncident-Ready.TestYourPlanwithaScenario Rob McMillan
13:15 – 14:15 Roundtable:ReduceTheRisksandImplementDataAccessControlsNow!Brian Lowans
14:15–14:45 SolutionProviderSessions14:30 – 16:00 Workshop:GetSecurityRightinanSMBEnvironment Rob McMillan
14:45–15:15 RefreshmentBreakintheSolutionShowcase
15:15–16:00 BeAgileNotFragile:UseThreatIntelligenceServicestoDefendYourself Rob McMillan
ThePathtoHighImpactSecurityAwareness christian Byrnes
MobileSecurityThreatsandTrends2015 Dionisio Zumerle
SecuringSensitiveSaaSUsingCloudAccessSecurityBrokers Ramon krikken
CaseStudy 15:15 – 16:15 Roundtable:ChangingYourSecurityCulture:WhyChangeisHardandWhattoDoAboutIt Debra Logan
16:15–16:45 SolutionProviderSessions 16:15 – 17:45 Workshop:SecureSelf-AssessingandSelf-CleansingSystemswithDevOps?Joerg Fritsch
16:30 – 17:30 Roundtable:ManagingtheIdentityofThingsAnt Allan
17:00–17:30 ProtectingYourHouseonthePrairie:SecurityStrategyfortheSmallerEnterprise Tom scholtz
IncidentResponsePlatforms—ALongTimeComing Rob McMillan
YourCloudServiceAdoptionStrategyMustIncludeDataProtection Brian Lowans
TheDarkSideofPaymentCardSecurity Jonathan care
WhyCrisisManagementistheHeartofBCMSoftware Roberta Witty
17:30–20:00 NetworkingReceptionintheSolutionShowcase
07:45–17:15 RegistrationandInformation
08:00–08:45 People-CentricSecurity:ExperiencesandLessonsLearnt Tom scholtz
HowtoGetSingleSignOn Ant Allan DefendingEndpointsfromthePersistentAttack Peter Firstbrook
PrivacyandtheInternetofThings:HowtoAvoidCrossingtheCreepyLine carsten casper
08:00 – 09:30 ContractNegotiatingClinic:CloudContracts,DevelopYourOwnSecurityandRiskExhibits Gayla sullivan
08:00 – 09:00 Roundtable:DoyouMeasuretheImpactofYourAwarenessProgram? christian Byrnes
09:00–09:45 CaseStudy What'sNewandHotinGRC? John Wheeler FutureofEndpointManagement Rob smith DefendingAgainstSophisticatedMalware Mario de Boer
BalancingTrustandUserExperienceforUserAuthentication Ant Allan
09:45–10:15 RefreshmentBreakintheSolutionShowcase
10:15–10:45 SolutionProviderSessions
11:00–11:45 CaseStudy UseaVendorRiskManagementFrameworktoMitigateRegulatory,Compliance,SecurityandPerformanceIssues Gayla sullivan
Panel:MobileSecurityandManagement:ARealWorldDiscussion Rob smith et al.
DesigningtheModernApplicationSecurityPerimeter—WithMobileandCloudinMind Ramon krikken
CybersecurityPanel:ITSecurity,OTSecurity,IoTSecurity:ImpactsandRecommendations Earl Perkins et al.
10:45 – 12:15 Workshop:IntroductiontoMobileSecuritySelf-Assessments John Girard and Dionisio Zumerle
10:45 – 11:45 Roundtable:BuildingSuccessfulBusinessMetricsforTechnologyRiskPaul Proctor
11:45–13:00 LunchintheSolutionShowcase 12:30 – 12:50 MagicQuadrantforEnterpriseNetworkFirewalls Jeremy D’Hoinne
13:00–13:45 AvoidFiveSecurityStaffingDisasters Jeremy D’Hoinne
DigitalBusinessandYourNewRelationshipwithRisk Paul Proctor
WhatRoleWillVPNsPlayinYourBusinessFuture? John Girard
SecureUseofAWSandAzure:ComparisonandBestPractices Neil MacDonald
OperationalTechnologySecurityisNotJustforIndustriesAnymore Earl Perkins
13:00 – 14:30 Workshop:IdentityProofingRevisitedasDataPrivacyDies Jonathan care
13:00 – 14:00 Roundtable:WhySocialMediaRisksAreSkyrocketingandWhatYouCanDotoProtectYourCompany John Wheeler
14:00–14:30 ChiefDataOfficersandChiefInformationSecurityOfficers:FriendsorFoes? Debra Logan
WhatCanWeExpectfromtheUpcomingEUDataProtectionRegulation? carsten casper
LessonsLearnedonAdvancedThreatDefenseStrategiesandTools Jeremy D’Hoinne
ProtectingMobileAppsDionisio Zumerle
CaseStudy
14:30–15:00 RefreshmentBreakintheSolutionShowcase14:45 – 16:15 Workshop:ReportingRiskandSecuritytoyourBoardofDirectors Paul Proctor
15:00–15:30 CaseStudy HowToBuildAGloballyLegalandSuccessfulBYODProgram John Girard
FriendsattheGate?BestPracticesforEnablingRemotePrivilegedAccessFromVendorsandThirdParties Felix Gaehtgens
TheLegalityandEthicsofIoTandEmployeeMonitoring TBD
15:00 – 16:00 Roundtable:SecureUseofPublicCloudNeil MacDonald
15:45–16:15 OneSimpleWaytoGetYourCEOtoEmbraceRiskManagement John Wheeler
AssessingCloudServiceProviders:GettingBeyondtheChecklistsErik Heidt
WhatYourContainersdoNotContain!AbouttheSecurityPropertiesofContainersManagedbyDocker Joerg Fritsch
WomeninSecurityandRiskManagement:DoWomenApproachSecurityandRiskManagementDifferentlyThanMen? Roberta Witty
16:30–17:15 Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security Neil MacDonald
Gartner Security & Risk Management Summit 2015 #gartnersecurity
Forfurtherinformationaboutsponsoringthisevent:
Telephone: +441784267456
Email: [email protected]
Sponsorship Opportunities
SolutionShowcase
Premier Sponsor
Platinum Sponsors
Developa“shortlist”oftechnologyandserviceproviderswhocanmeetyourparticularneeds.Weofferyouexclusiveaccesstosomeoftheworld’sleadingtechnologyandservicesolutionprovidersinavarietyofsettings.
As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security. Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world.
www.trendmicro.co.uk
AirWatch by VMware is the leader in enterprise mobility management (EMM). We enable end users with a seamless digital workspace, and empower IT with a future-proof mobility platform that provides fl exibility to manage multiple use cases, unifi ed management of endpoints, end-to-end security, and seamless integration across enterprise systems.
www.air-watch.com
Darktrace is a fast-growing cyber threat defense company and world leader in Enterprise Immune System technology. Darktrace’s award-winning solution is powered by machine learning and mathematics developed at the University of Cambridge, and helping organizations defend against advanced cyber-attacks and insider threat by detecting previously-unidentifi ed anomalies in real time.
www.darktrace.com
Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand.
www.qualys.com
Fortinet is a worldwide provider of network security appliances and a market leader in Network Security. Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100.
www.fortinet.com
Splunk Inc. provides the leading platform for Operational Intelligence. Splunk® software searches, monitors, analyzes and visualizes machine-generated big data from websites, applications, servers, networks, sensors and mobile devices. More than 8,400 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance and reduce costs.
www.splunk.com
Visit gartner.com/eu/security for more information
Silver Sponsors
Avecto is an innovative technology business specializing in endpoint security. The company’s revolutionary Defendpoint software ensures defense in depth while empowering users to work freely.
www.avecto.com
BlackBerry provides an end-to-end suite of secure mobile solutions, delivering innovative mobile technologies to users and organizations that value productivity and achievement. Learn more: www.BlackBerry.com.
www.blackberry.com
For 30 years, Boldon James has been a leader in data classifi cation solutions, helping organisations manage sensitive information securely & in compliance with legislation and standards.
www.boldonjames.com
Certes protects data in motion. Our CryptoFlow™ Solutions safeguard sensitive applications over any network with user-aware policies that protect data when fi rewalls can’t stop hackers.
certesnetworks.com
CSG Invotas is an award-winning leader in security orchestration and automation for global security operations, delivering an automated threat response solution to unify, orchestrate and automate key elements of incident response.
www.csginvotas.com
DenyAll is a European software vendor, an expert in next generation application security, building on 15 years of experience securing web applications and services.
www.denyall.com
Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta.
www.okta.com
Pirean are recognised leaders in Identity and Access management solutions, delivering industry best practice and expertise through a unique Software, Consulting and Support Services blend.
http://pirean.com
RedSocks is a Dutch IT security company specialising in detecting and defeating malware in the corporate market. RedSocks supplies the RedSocks Malware Threat Defender (MTD) as a network appliance.
www.redsocks.nl
eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats.
www.esentire.com
Imperva® is a leading provider of security solutions that protect business-critical data and applications. The company’s products enable organizations to discover vulnerabilities, protect information, and comply with regulations.
www.imperva.com
LogRhythm, a leader in security intelligence and analytics, empowers companies to rapidly detect, respond to and neutralize damaging cyber threats.
www.logrhythm.com
As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks.
www.ssh.com
Vectra Networks’ X-series detection platform continuously monitors traffi c to automatically detect cyber attacks, prioritizing them by greatest risk and enabling organizations to focus resources.
www.vectranetworks.com
Voltage Security provides end-to-end, data-centric encryption, tokenization and key management solutions that allows companies to seamlessly secure all types of sensitive information wherever it resides.
www.voltage.com
MetricStream is the market leader for integrated Governance, Risk, and Compliance (GRC) Management Solutions that enable organizations to deliver better business performance.
www.metricstream.com
Netskope™ is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across cloud apps so businesses can move fast, with confi dence.
www.netskope.com
ObserveIT, a pioneer in User Activity Monitoring, provides video recordings of user activity, analytics and alerting to address user- based attacks. Over 1,200 companies use ObserveIT. Visithttp://www.observeit.com for more information.
www.observeit.com
Secure Mobile Gateway pioneer. Mobile threat prevention and data usage optimization with real-time analytics. On device and in the cloud. Gartner Cool Vendor.
www.wandera.com
WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools.
www.watchguard.com
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior.
www.wombatsecurity.com
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data.
www.tenable.com
Sponsors correct as of 12 June 2015
Our analysts•Analyst-ledpresentations
•Analystone-on-oneprivatemeetings
•Analyst-facilitatedroundtables
Our research•100%independentandobjective
•Provenandreliable
•Relevanttoyourrole
Build a successful strategy•GetvalidationfromGartneranalysts
•Meetwithsupplierstosupportyourtacticalplanning
Expand your peer network•Innovateandproblem-solvewithlike-mindedpeers
•Jointhelargest,mostinfluentialnetworkofitskind
Grow in your role•Getcontentandsolutionsthataremostrelevanttoyou
•Leadmoreeffectively—anddevelopyourteam
WHY AttEnD A GARtnER EVEnt? WHAt MAKEs GARtnER EVEnts unIQuE?
©2015Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].
14 – 15 September | London, UK | gartner.com/eu/security
Gartner Security & Risk Management Summit 2015
Registration and pricing
Park Plaza Westminster Bridge200WestminsterBridgeRoadLondon,UKSE17UT
Phone+448444156780
www.parkplaza.com
GartnerHotelRoomRatePricesstartat£175pernightatParkPlazawhenusingpromotionalcodeGART130915
Venue
Money-backguarantee
If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee.
3easywaystoregisterWeb: gartner.com/eu/security
Email: [email protected]
Telephone: +442088792430
Pricing subject to change
early-bird price: €2,150 + UK VAT (offer ends 17 July 2015)
Standard price: €2,475 + UK VAT
public Sector price: €1,950 + UK VAT
Pricing
Gartner ClientsAGartnerticketcoversbothdaysoftheSummit.Contactyouraccountmanageroremailemea.events@gartner.comtoregisterusingaticket.
Group Rate discountMaximizelearningbyparticipatingtogetherinrelevantsessionsorsplittinguptocovermoretopics,sharingyoursessiontake-awayslater.
Complementary registrations:
• 1forevery3paidregistrations
• 2forevery5paidregistrations
• 3forevery7paidregistrations
Formoreinformation,[email protected].